Saturday, 31 December 2011

Bright spark: MIT student Stephan Boyer demonstrates his 'almost self-balancing' electric unicycle.The unicycle has a 'kill switch' that turns off the motor (pictured in his right hand)

MIT student invents first 'self-balancing' electric unicycle

It has a top speed of 15mph which is 2mph more than previously developed Segway.

It could be a great way of getting around town, but it needs plenty of practise.A student at the Massachusetts
Institute of Technology (MIT) has invented an ‘almost self-balancing’
electric unicycle that he uses to zoom around the campus.

An essential question confronting neuroscientists and computer vision
researchers alike is how objects can be identified by simply "looking"
at an image. Introspectively, we know that the human brain solves this
problem very well. We only have to look at something to know what it is.

But teaching a computer to "know" what it's looking at is far harder. In research published this fall in the Public Library of Science (PLoS) Computational Biology
journal, a team from Los Alamos National Laboratory, Chatham
University, and Emory University first measured human performance on a
visual task ‑ identifying a certain kind

A warm, earthlike planet orbiting a red dwarf star. Mendez's software
lets astronomers enter the data they know about a planet and then
constructs a vision of what it might look like

First software that 'renders' 3D worlds based on what we know

Draws worlds based on their size, chemistry and distance from star

Can render our Earth from historical data

Astrobiologist Abel Mendez of the
University of Puerto Rico at Arecibo has designed a software package
that can draw real-looking worlds based on the scientific data we receive from space telescopes - and says Nasa gets it wrong.

The US Air Force is developing simple but reliable quantum computers that can be built with off-the-shelf components

Light is one of the most promising carriers of quantum information. It is robust against decoherence because it does not interact with stray electric and magnetic fields and passes unscathed through transparent matter.

Famous security expert Karsten Nohl said that anyphone that is on GSM network can be hacked easily andmade to send sms and calls without the owner's consent.

GSM is a widely used digital mobile telephony system.Mobile services based on GSM technology were first launched in Finland in 1991. Today, more than 690 mobile networks provide GSM services across 213 countries and GSM represents 82.4% of all global mobile connections. According to GSM World, there are now more than 2 billion GSM mobile phone users worldwide. GSM World references China as "the largest single GSM market, with more than 370 million users, followed by Russia with 145 million, India with 83 million and the USA with 78 million users."

But a new vulnerability demonstrated
by Karsten Nohl, head of Germany's Security Research Labs, shows that
any phone on any GSM network is vulnerable to attack.

The new attack - which Nohl did not publish - allows hackers to control hundreds of thousands of mobile phones at once.

Saturday, 31 December 2011

Bright spark: MIT student Stephan Boyer demonstrates his 'almost self-balancing' electric unicycle.The unicycle has a 'kill switch' that turns off the motor (pictured in his right hand)

MIT student invents first 'self-balancing' electric unicycle

It has a top speed of 15mph which is 2mph more than previously developed Segway.

It could be a great way of getting around town, but it needs plenty of practise.A student at the Massachusetts
Institute of Technology (MIT) has invented an ‘almost self-balancing’
electric unicycle that he uses to zoom around the campus.

An essential question confronting neuroscientists and computer vision
researchers alike is how objects can be identified by simply "looking"
at an image. Introspectively, we know that the human brain solves this
problem very well. We only have to look at something to know what it is.

But teaching a computer to "know" what it's looking at is far harder. In research published this fall in the Public Library of Science (PLoS) Computational Biology
journal, a team from Los Alamos National Laboratory, Chatham
University, and Emory University first measured human performance on a
visual task ‑ identifying a certain kind

A warm, earthlike planet orbiting a red dwarf star. Mendez's software
lets astronomers enter the data they know about a planet and then
constructs a vision of what it might look like

First software that 'renders' 3D worlds based on what we know

Draws worlds based on their size, chemistry and distance from star

Can render our Earth from historical data

Astrobiologist Abel Mendez of the
University of Puerto Rico at Arecibo has designed a software package
that can draw real-looking worlds based on the scientific data we receive from space telescopes - and says Nasa gets it wrong.

The US Air Force is developing simple but reliable quantum computers that can be built with off-the-shelf components

Light is one of the most promising carriers of quantum information. It is robust against decoherence because it does not interact with stray electric and magnetic fields and passes unscathed through transparent matter.

Famous security expert Karsten Nohl said that anyphone that is on GSM network can be hacked easily andmade to send sms and calls without the owner's consent.

GSM is a widely used digital mobile telephony system.Mobile services based on GSM technology were first launched in Finland in 1991. Today, more than 690 mobile networks provide GSM services across 213 countries and GSM represents 82.4% of all global mobile connections. According to GSM World, there are now more than 2 billion GSM mobile phone users worldwide. GSM World references China as "the largest single GSM market, with more than 370 million users, followed by Russia with 145 million, India with 83 million and the USA with 78 million users."

But a new vulnerability demonstrated
by Karsten Nohl, head of Germany's Security Research Labs, shows that
any phone on any GSM network is vulnerable to attack.

The new attack - which Nohl did not publish - allows hackers to control hundreds of thousands of mobile phones at once.